DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
暂无分享,去创建一个
[1] Shahram Jamali,et al. Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .
[2] Anal Patel,et al. Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[3] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[4] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[5] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[6] Terje Aven,et al. An approach to maintenance optimization where safety issues are important , 2010, Reliab. Eng. Syst. Saf..
[7] A. Perelson. Immune Network Theory , 1989, Immunological reviews.
[8] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[9] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[10] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[11] Bin Wang,et al. Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..
[12] Mustapha Nourelfath,et al. Extra-capacity versus protection for supply networks under attack , 2014, Reliab. Eng. Syst. Saf..
[13] Shahram Jamali,et al. Defense against SYN flooding attacks: A particle swarm optimization approach , 2014, Comput. Electr. Eng..
[14] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[15] Sheng Zhong,et al. DAWN: Defending against wormhole attacks in wireless network coding systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[16] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[17] Xiangke Liao,et al. WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks , 2013, 2013 42nd International Conference on Parallel Processing.
[18] K. V. Kumar,et al. A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Networks , 2012, 2012 International Conference on Computing Sciences.
[19] Geerten van de Kaa,et al. Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes , 2017, Telecommun. Syst..
[20] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[21] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .
[22] Nabendu Chaki,et al. A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[23] Tao Zhou. An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..
[24] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[25] Brendan Jennings,et al. Semantic aware processing of user defined inference rules to manage home networks , 2017, J. Netw. Comput. Appl..
[26] Jidong Wang,et al. An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set , 2012 .
[27] Vandana Dubey,et al. Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).
[28] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[29] Zuowen Tan. An efficient identity-based tripartite authenticated key agreement protocol , 2012, Electron. Commer. Res..
[30] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[31] Katina Michael,et al. Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..
[32] Rajendra V. Boppana,et al. On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[33] Mohammad S. Obaidat,et al. Wormhole prevention using COTA mechanism in position based environment over MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).